The importance of mandatory data breach notification to identity crime
Identity crime : The challenges in the regulation of identity crime
Zero-day malware detection based on supervised learning algorithms of API call signatures
The seven scam types: Mapping the terrain of cybercrime
Understanding victims of identity theft: Preliminary insights
Windows rootkits: Attacks and countermeasures
Are you sure you would like to clear your session, including search history and login status?